HOME
*





Multistate Anti-Terrorism Information Exchange
The Multistate Anti-Terrorism Information Exchange Program, also known by the acronym MATRIX, was a U.S. federally funded data mining system originally developed for the Florida Department of Law Enforcement described as a tool to identify terrorist subjects. The system was reported to analyze government and commercial databases to find associations between suspects or to discover locations of or completely new "suspects". The database and technologies used in the system were housed by Seisint, a Florida-based company since acquired by Lexis Nexis. The Matrix program was shut down in June 2005 after federal funding was cut in the wake of public concerns over privacy and state surveillance. History Matrix was the brainchild of Hank Asher, a businessman in the data aggregation field. Asher reportedly contacted Florida police immediately after the September 11 terrorist attacks, claiming he could find the hijackers as well as other potential terrorists. Asher reportedly offered ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Free Expression Policy Project
The Free Expression Policy Project (FEPP) is an organization devoted to assisting researchers with assembling information related to freedom of speech, media democracy, and copyright, and advocating for these issues. Civil liberties lawyer Marjorie Heins founded the nonprofit organization in 2000. Based in Manhattan, New York, it was initially associated with the National Coalition Against Censorship, and subsequently operated as part of the Democracy Program of the Brennan Center for Justice at New York University Law School. The FEPP conducted a survey in 2001 which revealed that online monitoring software, including Net Nanny, SurfWatch, and Cybersitter, cast too broad a net and often blocked legitimate educational websites in their attempts to censor material from youths. In 2003, the organization assisted 33 academics in filing a friend-of-the-court brief challenging a law which restricted the sale of violent video games to minors. In coordination with the Brennan Center for ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Spam
Spam may refer to: * Spam (food), a canned pork meat product * Spamming, unsolicited or undesired electronic messages ** Email spam, unsolicited, undesired, or illegal email messages ** Messaging spam, spam targeting users of instant messaging (IM) services, SMS or private messages within websites Art and entertainment * Spam (gaming), the repetition of an in-game action * "Spam" (Monty Python), a comedy sketch * "Spam", a song on the album ''It Means Everything'' (1997), by Save Ferris * "Spam", a song by "Weird Al" Yankovic on the album ''UHF – Original Motion Picture Soundtrack and Other Stuff'' * Spam Museum, a museum in Austin, Minnesota, US dedicated to the canned pork meat product Other uses * Smooth-particle applied mechanics, the use of smoothed-particle hydrodynamics Smoothed-particle hydrodynamics (SPH) is a computational method used for simulating the mechanics of continuum media, such as solid mechanics and fluid flows. It was developed by Gingold and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




External Links
An internal link is a type of hyperlink on a web page to another page or resource, such as an image or document, on the same website or domain. Hyperlinks are considered either "external" or "internal" depending on their target or destination. Generally, a link to a page outside the same domain or website is considered external, whereas one that points at another section of the same web page or to another page of the same website or domain is considered internal. These definitions become clouded, however, when the same organization operates multiple domains functioning as a single web experience, e.g. when a secure commerce website is used for purchasing things displayed on a non-secure website. In these cases, links that are "external" by the above definition can conceivably be classified as "internal" for some purposes. Ultimately, an internal link points to a web page or resource in the same root directory. Similarly, seemingly "internal" links are in fact "external" for ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

USA PATRIOT Act
The USA PATRIOT Act (commonly known as the Patriot Act) was a landmark Act of Congress, Act of the United States Congress, signed into law by President of the United States, President George W. Bush. The formal name of the statute is the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001, and the commonly used short name is a contrived acronym that is embedded in the name set forth in the statute. The Patriot Act was enacted following the September 11 attacks and the 2001 anthrax attacks with the stated goal of tightening U.S. national security, particularly as it related to foreign terrorism. In general, the act included three main provisions: * expanded surveillance abilities of law enforcement, including by Telephone tapping, tapping domestic and international phones; * easier interagency communication to allow federal agencies to more effectively use all available resources in counterterro ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Driver License Agreement
In the United States, the Driver License Agreement (DLA) is an interstate compact written by the Joint Executive Board of the Driver License Compact (DLC) and the Non-Resident Violator Compact (NRVC) with staff support provided by the American Association of Motor Vehicle Administrators (AAMVA). The DLA requires all states to honor licenses issued by other member states, report traffic convictions to the licensing state, prohibit a member state from confiscating an out-of-state driver's license or jailing an out-of-state driver for a minor violation; and maintain a complete driver's history, including withdrawals and traffic convictions including those committed in non-DLA states. When a DLA member state receives a report concerning its drivers from a non-DLA member state, the member state will be required to treat the report the same as if it came from a member state. As with the previous compacts, the DLA requires a state to post all out-of-state traffic convictions to the driver ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Terrorist Screening Center
The Terrorist Screening Center (TSC) is a division of the National Security Branch of the Federal Bureau of Investigation. It is the duty of the TSC to identify suspected or potential terrorists. Though housed within the FBI, the TSC is a multi-agency organization, including representatives from the United States Department of Justice, the United States Department of State, the United States Department of Homeland Security, the United States Department of Defense, the United States Postal Service, and various private contractors. It is located in Vienna, Virginia, near Virginia State Route 123. Established by presidential directiveGeorge W. Bush.Directive on Integration and Use of Screening Information To Protect Against Terrorism(Homeland Security Presidential Directive 6). September 16, 2003. in the wake of the September 11, 2001 attacks, the TSC's funding and manpower have significantly increased since that time. Duties The Terrorist Screening Center maintains a database, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as Human intelligence (intelligence gathering), human intelligence gathering and postal interception. Surveillance is used by citizens for protecting their neighborhoods. And by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to Industrial espionage, gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting he ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Joint Regional Information Exchange System
{{more footnotes, date=December 2009 The Joint Regional Information Exchange System (JRIES) began in December 2002 as an all-source intelligence / information sharing system, designed initially as a grassroots pilot system to connect the California Anti-Terrorism Information Center, the New York Police Department, and the Defense Intelligence Agency (DIA). Purpose These groups designed JRIES, which was first deployed in February 2003, to facilitate the exchange of suspicious activity reports, register events potentially related to terrorist activity, and foster real-time intelligence and law enforcement collaboration in a secure environment across federal, state, and local jurisdictions. JRIES used a commercial, off-the-shelf software collaboration tool application to enable multiple groups to share the information securely. A JRIES executive board, composed of representatives from the participating groups, provided guidance and structure to help manage the system. JRIES proved use ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Computer Assisted Passenger PreScreening System II
The Computer Assisted Passenger Prescreening System II (CAPPS II) was a program of the United States Department of Homeland Security (DHS) instituted to increase security at airports by assessing the risk level of passengers before they're allowed to board. CAPPS II searched through information stored in government and commercial databases and assigned a color-coded level of risk to each passenger. Amid controversy from such organizations as the American Civil Liberties Union (ACLU), the Electronic Privacy Information Center (EPIC), and the Electronic Frontier Foundation (EFF), the program was terminated by President Bush in August 2004. The program was then replaced by a similar program called Secure Flight in early 2005 generating the same concerns over privacy and civil liberties. However, due to public concerns, Secure Flight did not become operational until 2010. CAPPS II grounded innocent Americans due to false positives. One notable example is the grounding of Senator Ted K ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]